+ All Categories
Home > Documents > DATA - Site Title · When the end users spend their attention to consume services of their choice,...

DATA - Site Title · When the end users spend their attention to consume services of their choice,...

Date post: 12-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
60
DECENTRALIZED AI-POWERED TRUST ALLIANCE Blockchain Data Foundation Ltd. In Collaboration with Yomob International Co., Ltd. White Paper Draft Version 1.52 This Whitepaper is subject to the disclaimers set out on pages [52] to [60]. Please read them in full and carefully. Contents are subject to change along with project progress. DATA Decentralized AI-Powered Trust Alliance
Transcript
Page 1: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Blockchain Data Foundation | 1

Blockchain Data Foundation Ltd. In Collaboration with Yomob International Co., Ltd.

White Paper Draft Version 1.52

This Whitepaper is subject to the disclaimers set out on pages [52] to [60]. Please read them in full and carefully. Contents are subject to change along with project progress.

DATA Decentralized AI-Powered Trust Alliance

Page 2: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Table of Contents

Abstract..………………………………………..……………………………………………………………………………………………….…………………………………………….

Introduction……………………………………………………………………………………………………………….……..……………………………………………………….….

1. Limitation of Centralized Internet Advertising Bureau…………….………………………………………………………………………………….….

2. Severe Ad Fraud……………………….……………………….……………………….………………………………….………………………………………………….…..

3. Rewarding User's Attention on Ads Consumption………….…………………………………..……………………….………………………….…….

4. The Solution: Blockchain Based Attention Reward to Prevent Ad Fraud…………………..……………………………………….…..…

Competitive Landscape……………………………………………………….………………………………………………..…………………………………………….……

1. Basic Attention Token (BAT)……………………………….…………………………………….………………………….………………………………….………

2. AdChain……………………………….…………………………………..……………………….…………………..……..……….……………………………….……….…..

3. AdEx and Papyrus……………….…………………………………..………………………..………………….………………….……………………………….….…..

DATA Technology Design…………………………………………………….………………………………………………….……………….…………………….….……..

1. P2P Mobile Storage Layer……………………………………………….………………………………………………….…….……………………….……….…….

1.1 Mobile Node Join/Leave …………………………………………….……………………………………………………..….……………………….…………………

1.2 File Erasure Encoding …………………………………………….…………………………..…………………..…………..….……………..….………….…………

1.3 File Store/Lookup …………………………………………….………………………………..…………………..……….…..….………….………..….………….…….

1.4 Comparison with the IPFS ……………………………………….…………………………………………………….….….…..….………….….…..….…………..

2. Blockchain Layer………………………………………….…………………………………………..………………………….………….……….………….….….……….

2.1 Consensus Engine…………………………………….………………………………………………………………..…..….……….…….……….…….……….……….

2.2 Proof of Attention (PoA) based Token Reward.………………………………………………….…………………….…......................................

2.3 State Channels…………………………………….………………………………………………..…………………..….…………………...............….................….

2.4 Smart Contracts………………………………….………………………………………………….…………………..….…………….…………….………………………

3. SDK Management Layer………………………….…………………..……………………………………….…….………….…………………………......…..........

3.1 Open Source SDK…………….……….………………..…………………………………….……………………………..……………........………...….........….…...

3.2 Game theory based Incentive Modeling………………….……………………………….………………………..........………......………......………...

3.3 Reputation Management…….………………………..…………………………………….….………………….……….……………….………………….….……

4. Application Process Layer…………………….……….…………………….…………………….….…………………….…….……………….……………………

4.1 Fraud Prevention……….……….………………..…..…………………………………….….………………….……………….………….…...…….…...….…….…...

4.2 Micropayment for User Application………………..…..…………………………………….….………………………………………………………………..

4.3 Decentralized Ad Exchange………………….…………..……………….……….….…………………..…..................…..…................…..…................

5. DATA System Flows…………………………..…..………………………….……….…………..………………………..……………………….………………………

Blockchain Data Foundation | 2

35

5

6

9

10

12

12

14

15

16

18

19

22

22

24

2424

25

26

27

2727

28

34

34

34

32

35

25

Page 3: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Innovation Partner………………….…………..…..………………………….……….………………..……………….……………….……………….…………..…….….….

Team………………….…………..…..………………………….……….………………………………………………….………………….………………….……….…………….…….

Board of Advisors………………….…………..…..………………………….……….………………………………….…….…………………………………………………….

Scientists…………………………………….…………..…..………………………….……….………………………………….…….………………………………………………….

Investors & Partners………………….…………..…..………………………….……….…………….…………………..…..………........…..………........…....…..…..…

Roadmap………………….…………..…..………………………….……….…………………………………………..….…...…..…..…..…..…..…..…..…..…..…...……..…...

References………………….…………..…..………………………….……….………………………………….….................…..…..…..……..…..…..……..…..…..…........

Whitepaper Disclaimers………………….…………..…..………………………….……….………………………………….….................…..…..…..……..…..…..

Blockchain Data Foundation | 3

37

40

43

4647

49

52

45

Page 4: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

One of the most overwhelming challenges in the digital advertising industry is the abundance of fraudulent data flowing into the entire network, commonly termed as “Ad fraud”.

Currently, more than 40% of digital ad traffic is

generated by automated bots which have defrauded

advertisers in billions of US dollars annually [29]. Such

fraudulent performance marketing deteriorates

efficiency of the whole industry, and results in

exorbitant costs for advertisers and thereby cuts into

the actual revenue for legitimate publishers. Ad fraud is

more of a systematic problem. As the digital marketing

and advertising ecosystem becomes more and more

complex, the middle layers between advertisers and

publishers also swell into multiple stacks. Although the

pattern of fraud traffic can be detected, gradually more

and more by the evolving machine learning

technologies, the ever deeper origin or the source is

hardly traceable because of the multi-stacked middle

layers that typically excel in extremely complex

redistribution, routing and redirecting. Such complexity

inevitably has itself invigorated a new set of problems

into the digital advertising ecosystem, such as “walled

garden” and “data isolation”, etc. The entire AdTech

industry is constantly facing the prisoner’s dilemma in

that while data sharing globally would maximize the

overall performance and effect, yet the optimal

strategy for individual user is to keep the behavioral

data exclusive locally on the device, be it a PC or

mobile. The reason for such dilemma is due to lack of

strong incentive to encourage data sharing, and

inability to deliver actual value of such incentive if and

when it's available. Autonomous, fair and transparent

governance, while simply self-contradictory in a

centralized environment, constitutes main thesis in a

decentralized and consensus based infrastructure,

especially with the blockchain technology.

"We are entering a new era, where people expect the value of the services and communities they create is shared with them......Blockchain tokens offer a new way of sharing that perceived value of the community to its members."

– Mikko Alasaarela, CEO/founder, inbot.io

Blockchain Data Foundation | 4

Abstract

Forrester Report recently published a study titled "Mobile Fraud: Marketers' Massive Hidden Threat". It is a profound and alarming reflection from the digital marketing and advertising industry to look inside of the beast that has been fed by the industry itself and grown in pace with the latter. This beast is no longer easily containable as the speed of mobile device penetrating in every aspect of our daily life is heightened and our appetite is bigger and hungrier for better quality of content and information of the goods we want to consume.

Page 5: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Since monetization relying on advertising has

contributed to large share of revenue stream for most

internet companies, the current model developed in the

past decades has been built on a centralized economy

by gauging end user's attention to the ads for better

targeting. The demand for user attention has been

rising as the competition gets tougher and push for

volume number of users becomes a tug of war for the

gain and for the survival of Internet companies. The

stake is so high and the gain is lucrative, thus created

loopholes for the birth of fraud data with fake users,

installs and fake activation, etc. that continues to flood

the entire communication network. Many advanced

fraud detection technologies have been developed to

tackle the problems, but most of them focused on the

after-fact detection and then to analyze patterns of the

data to determine the validity of end user if it even

exists.

The technology needs to be able to build into

preventing the fraud being propagated into the

network traffic flow. The data of the user's attention

patterns need be logged and encrypted to be

distributed over a decentralized P2P protocol in order

to deliver the heightened security with consensus from

the community auto-programmatically. Thus it can be

validated any time, while stored across the network

and shared in real-time.

Applying the blockchain technology and the Artificial

Intelligence plowing on deep learning is the foundation

technology that can set the standard to ensure the

decentralization of the least risky information data

flow and storage requirement, where every player in

the community or the ecosystem becomes the ultimate

winner.

Blockchain Data Foundation | 5

Page 6: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

The DATA project is devised to address the root of the fraud at its core. To ensure that every participant in the

ecosystem is motivated to "do good", the DATA platform applies a reward system to incentivize end users with

their attention contribution and to publishers with pruning their sell-side inventory. More granular information is

collected and privately encrypted into a built-in peer-to-peer data storage for sharing across the network. Because

every user is made aware of varying rewards only appropriate for his/her attention consumed on ads served in

games or apps, it is highly catered and more personal.  Therefore a user is less inclined to  reject, ignore or block

advertising.  The experience institutes a more intimate relation between the advertisement and its consumer. 

On top of that, advertisement consumption, no matter what format, be it banner or interstitial or a video or a

playable advertisement,  is tracked at the device level.  Besides being the base for the hugely beneficial rewarding

for the true user, the analysis of the behavioral data allows the subsequent conclusion of whether the user is a real

person or a fake bot.

The DATA project's most innovative edge is to proactively identify the fraudulence based on the pattern or behavior

analysis via our proprietary AI algorithm, prior to the fraudulent user data being injected into the entire network. 

Such preventive measurement is the other side of the coin where reward is granted to a true user for his/her

attention consuming the advertisements and to the associated device contributing to in the P2P storage sharing.

The DATA platform and its token, DATA Token (DTA) will serve as the backbone of its blockchain based advertising

infrastructure. The system supports micropayment  where tokens can be used across applications, such as

purchasing virtual items and premium services, or for publishers-  redeemed  as currency in ad networks, DSPs

(Demand Side Platforms), ad exchanges, third-party SaaS (Software as a Service) service and etc.

5.

Blockchain Data Foundation | 6

Introduction

DATA is a blockchain project initiated and governed by Blockchain Data Foundation Limited (“Blockchain Data Foundation”, or BDF from hereafter), a company limited by guarantee to be incorporated in Singapore and governed in a not-for-profit manner. This project is being developed in collaboration with Yomob International Co., Ltd. (“Yomob”), a mobile monetization-as-a-service company.

Page 7: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

6. DA 1. Limitations of Centralized Internet Advertising Bureau

As Internet services derive their revenue from paid subscriptions or advertisements, the latter has been proven to be

taking a much larger share behind the duopoly, namely Google and Facebook. Digital advertising is fundamentally

a targeted delivery of marketing message, and measurement of whether and how such messages are consumed.

When the end users spend their attention to consume services of their choice, the publishers/service providers/

media/developers manage to gather user attention data for analysis and reporting, in order to index any errors and

to refine future precision in targeting.

Figure 1. Mobile Internet Ad Spending Worldwide, 2015-2020 [1]

With the rising of mobile era, digital advertising has been drastically shifted to formulate mobile centric strategy.

According to [1], mobile advertising now accounts for 68.5% of total global digital advertising expenditure and the

trend is only going upward.

Bad actors in the ecosystem have deliberately created alarming amounts of malvertisement that have been

extremely difficult to track and eliminate. Along that line, there is also high risk of user's personal data being

exposed to unknown and unaccountable layers of intermediaries.

To police the network, IAB (Interactive Advertising Bureau) was created to govern the industry’s standard fraud

reporting by way of blacklist and whitelist of malicious nodes, like Ads.txt[10]. Despite their good intentions and

tremendous effort put in to serve the industry as it has been, these centralized reports are facing enormous

challenge:

Blockchain Data Foundation | 7

Page 8: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

DATA INTEGRITY

These lists are centrally managed and

organized. It is reasonable to challenge

that the lists may be compromised due

to single threaded programmatic

mistakes or human errors.

TRANSPARENCY

Almost acted as a block box operation,

there has not been much detail shared as

to the ranking and measurement process

over the data it collected and dissected,

or whether the 3rd party authentication

is certified. Lack of transparency opens

windows for prolific fraud activities.

REAL-TIME PRECISION

With the real time dynamics

occurring in every micro second

in the ad trading, bidding and

delivering, these lists quickly

became out of date and therefore

lack accuracy in a timely manner

to reflect the fast changing of all

the actors involved. For example,

a benign publisher may introduce

bot traffic after it is put into the

whitelist, making it unpredictable

and almost unpreventable in the

real time manner.

MONOPOLY OF DATA

It lacks check and balance.

Out-of-date technology is

overwhelmed with the ever

increasing volume of

information it must process

and index to provide the

guidance through the black-

and white-list. The reporting

cannot be as fast as the

fraud being generated and

propagated in the internet

speed, as a consequence it

perpetuates the Mouse-and-

Cat game.

2. Severe Ad Fraud

According to [6], intermediaries take more than half of advertising revenues. For example, if an advertiser's budget

is $100, less than $50 goes to the end publisher while intermediaries take more than $50.

Figure 2. U.S. Digital Ads Landscape by Lumar Partners [6]

Blockchain Data Foundation | 8

Page 9: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Primarily ad ecosystems are primarily composed of advertisers, publishers and users. Advertisers budgeted their

marketing expenditure and let known of the target and expected KPI to publishers who own various networks

directly or indirectly that can reach to the end users. Creative of an ad campaign would be eventually displayed to

the end users in order to gain their attention. To bridge enormous upstream demand of ads serving with

downstream supply of user reach, the mid-tier services have evolved to broker the matching, each to differentiate

by offering more value-added services. The programmatic I/O has inevitably emerged in all levels to facilitate and

fulfill the appetite of the global marketing needs, and driven by speedier and wider spread of the mobile devices.

These mid-tier services include demand side platform (DSP), ad exchanges (ADX), ad networks (ADN), supply side

platform (SSP), data vendor, ad attribution, analytical and reporting tools, optimization, trading desks, agencies etc.

Along with these services evolved to tackle a number of general or specific issues in the daily transaction of

unthinkable volume of ad trading, the scale of complexity and cost also skyrocketed. The increasing complexity with

its resulting negative impact on the health of the ecosystem, prompts the industry to search for better solutions.

Looking deeper into the formation of the complexity, one could identify several issues, namely the insolation of

information and limited sharing of data.

Service providers typically offer programmatic interfaces such as APIs (Application Programming Interface) or SDKs

(Software Development Kit) to facilitate functions or features as well as certain data exchange. Fundamentally

every actor desires data, but inherently every one also guards certain data as part of its own purpose of mining the

data, thereby between parties, there exists "walled garden". Understandably, owning deeper level and extra

amount of user data adds to the competitive edge over the rivalry’s, it is at the same time, exactly this mentality

that fosters the warm bed of volume amount of fraud by bad actors for lucrative gains. True end user is becoming a

pawn in the game without even being aware of it.

Currently some of the ad fraud prevention service providers such as TUNE or Appsflyer would track converted user

data from the advertiser’s promoting apps as well as data provided by ADNs and DSPs. Such solution is as

passive as an after-fact by identifying the fraud actors. So far such solution has not been able to prevent the fraud

from being deliberately leaked into the ad marketplace. The critical challenge of the current state of ad fraud

prevention methodology is the ability to track down the original source of fraud downstream instead of just

detecting the fraud occurrence based on the data collected from upstream.

3. Rewarding User's Attention on Ads Consumption

The ultimate source of all the advertisement income is user attention. A common Internet business model is users

get free access to digital services, content and information, like news or media websites and App's, Facebook,

Instagram, blogs, etc. While users contribute their attention by viewing the advertisements, the service providers

then collect advertisement revenue. This business model had been worked well, but the landscape changed as the

Blockchain Data Foundation | 9

Page 10: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

mobile Internet develops. First, publishers try to get advertisement revenue more and more aggressively, they

exhaustively collect users' personal data, draw the user profiles, try their hardest to insert more ads into the original

contents (and in a more ambiguous, hardly distinguishable way), and build extremely sophisticated models just

trying to make users click more ads. In the end, user privacy is placed into jeopardy but they got less and less

valuable original content. In addition, next generation mobile ads, such as video advisement, interactive

advertisement, playable advertisement, Augmented Reality advertisements, are consuming increasing amount of

users’ attention. More and more users started to employ ads blocking tools and technologies, according to [8], more

than 600 million mobile and desktop devices now use ad blocking. They are downloading ad-blocking tools on their

mobile devices and this number is growing rapidly. The relationship between publishers and users are no longer

win-win, but a combat. The problem to that is users are not well and systematically rewarded but they deserve.

Figure 3. Devices Using Adblock Software on Open Web [8]

With the emergence of mobile ad technology, the value exchange based mobile ads model become very popular

among certain mobile ad verticals such as rewarded video ads adopted by lots of mobile games. It is a great

balance between user experience and ad monetization. For instance, game player gets some special in-app reward

for viewing a video ad, such as Piano Tile 2 from Cheetah Mobile [24]. Also, users can view an ad to get offline

rewards such as coupons. These are good initiatives to reward users for their attention contribution. However, these

kinds of value exchange based ads have several limitations:

a) They are only feasible for specific type of mobile application publishers;

b) They may deliver benefits that's not needed by the users;

c) They frequently come with more distractive content that bothered users;

Blockchain Data Foundation | 10

Page 11: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

d) Users’ attention have different opportunity costs given different applications and time they spend viewing the

advertisements. However, rewards nowadays are not tailored to the value of the individual user’s attention.

To summarize, the time has come for users to be well and fairly rewarded for the attention they contribute, but in a

systematic, user-friendly, and widely adopted way.

4. The Solution: Blockchain Based Attention Reward to Prevent Ad Fraud

Technically, fraud traffic is not hard to detect as long as advertisement tracking data is authentic and available. But

the previously mentioned isolation and complexity in the middle layers make it extremely hard to gather all available

tracking data and trace back fraud traffic to its original sources. The “prisoners’ dilemma” as mentioned calls for a

out-of-the-box solution, some practical and effective incentives to make ads tracking data publicly shared and

available. The incentive needs to be conducted in a decentralized manner as no centralized entity in the online ads

industry is capable of handling this, or can be trusted by everyone else. Decentralized governance and incentive

distribution are just what blockchain is best at, therefore we have come up with DATA, the blockchain based cyber

advertising protocol for ad fraud prevention.

DATA is a blockchain based advertising protocol and technology stack. It consists of 4 layers: P2P Mobile Storage

Layer, Blockchain Layer, SDK Management Layer and Application Process Layer.

P2P MOBILE STORAGE LAYER

is a P2P based decentralized mobile

storage and distributed hash table (DHT).

User activity logs are encoded using

erasure coding and distributed in the DHT.

BLOCKCHAIN LAYER

is the DATA chain, which is a standalone

public chain, built from a fork of Ethereum on

Tendermint, the Ethermint project. The DATA

chain has extra logic of working with the rest

of the system: storage layer, SDK layer, and

fulfills the objective of attention rewarding

and ad fraud detection. In the meantime,

DATA chain will incorporate state channel

technologies to support micropayment.

SDK MANAGEMENT LAYER

contains SDK and protocol for collecting data and perform initial

data processing. The open-source SDK transforms user’s mobile

device into a node in a P2P data storage. It serves as “oracle” to

collect data and store data into the storage layer. In the

meantime, it contains reputation modeling and management

algorithm in calculating the proper amount of attention reward.

APPLICATION PROCESS LAYER

consists of protocol and smart contracts to perform applications

of the system, the most important of which is fraud detection.

The application layer supports other utilities like micropayment

based user application and decentralized ad exchanges etc.

Blockchain Data Foundation | 11

Page 12: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Websites and app developers can integrate DATA SDK to their stacks and process the following functions:

a) Transforms the computer or device into a node of the mobile P2P storage and DHT.

b) Collects users’ activity logs.

c) Reputation modeling calculates the reputation score based on the activity data.

d) Activity logs and reputation data are stored into the DHT.

e) The DATA blockchain reads data from DHT, and periodically determines and distributes the attention token

reward and handles fraud traffic detection.

The following chapters entitled "Competitive Landscape" is a rather extensive study on a few of the digital

advertising projects based on the state of the art blockchain technology. They are analyzed and compared with

DATA. In the chapter entitled "DATA Project Technology Design", the high level design of DATA illustrates its

technical core competency, followed by why Yomob is the perfect launch pad for DATA, and this Whitepaper will

end with introducing our key partners, team, advisors and the road map.

Blockchain Data Foundation | 12

Page 13: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

1. Basic Attention Token (BAT) [3]

BAT is developed by the Brave browser team and is the pioneer in blockchain based attention rewarding. Users’ are

rewarded for their advertisement viewing time within the Brave browser with digital tokens; and these tokens can

be used in user applications as well as a currency in the advertiser - publisher - user business flow. BAT is limited

by the following factors:

CENTRALIZATION

It’s a centrally managed

application token issued by the

Brave company. The tokens can

only be used within Brave

ecosystem, and not anywhere

else on the Internet. The

governance of the Brave

ecosystem is under the company’s

control, not the holders of the

tokens and end users.

EFFICIENCY

BAT is an ERC20 token on

Ethereum blockchain, therefore

the efficiency is subject to the

capacity of Ethereum. The

transaction latency of Ethereum,

which is typically several minutes

and the scalability of Ethereum,

which is around 10 transactions

per second on the whole network,

makes BAT tokens not feasible in

real-life applications like

micropayment or ad bidding.

DEPENDENCY

Dependence on the Ethereum

network not only introduces

efficiency problems, but also

feasibility problems. Transactions

involving BAT tokens require

burning ETH as gas. For an

ordinary end user, who does not

possess ETH, or doesn’t have

knowledge of crypto tokens or the

Ethereum blockchain, this

presents a practical problem -

how can Brave company

persuade an end user to purchase

ETH from places like exchanges

and use it as currency to pay for

any desired BAT transactions?

Blockchain Data Foundation | 13

Competitive Landscape

As the blockchain technology has become more broadly adopted, few of its applications are aiming to resolve the larger issues facing the digital advertising industry, namely the fraud, the numerous intermediaries, and the centralized agency dictating the obsolete rules and the more indifference of end users toward the ad serving.

Some of these blockchain application projects do try to focus on certain specific problems although in a narrower sense. However, the level of feasibility or efficiency of them is the subject of this chapter that we will analyze and make reasonable comparison.

Page 14: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

PRACTICABILITY

In BAT’s model, the advertisers need to buy tokens from exchanges and

pay them to publishers and users. This is not much different from current

money flow other than the fact that users receive a portion of tokens

immediately. It’s not made clear in BAT’s white paper whether this token

flow runs parallel with current money flow or will substitute current money

flow. In either case, it’s not practically or easily achievable to coach all

advertisers to buy BAT tokens as the currency in the advertisement flow.

Currently, BAT lacks the infrastructure to do so: they do not have a digital

ad exchange system on blockchain, and the performance of Ethereum

prevents them from building an effective system.

AD FRAUD

BAT does not present a solution to

ad fraud. To make matters worse,

it is vulnerable to fraud traffic. As

the token distribution is based on

a simple timestamp-based

formula, there is incentive for

fraudulent end users to create

fake traffic to get more tokens, like

those performed in clicking farms.

In contrast, DATA works perfectly in these scenarios. It is a set of blockchain based protocol and technology stack.

Being a standalone chain means the governance is managed by the community of all players in the ecosystem, and

the area of application is not restricted to any specific browser or application, but anyone who adopts the protocol.

Our technology stack, the P2P based mobile storage layer, Tendermint based consensus engine, as well as the

incorporation of state channels for micropayment makes the DATA blockchain highly performant and scalable.

Being a standalone chain means DATA does not have the “burn ETH for BAT transaction” problem.

In DATA, reward tokens are not purchased by the advertisers, but distributed by the system in a mining like process.

This enables the token flow to coexist with current money flow with the money flow unchanged. Since advertisers

need to do nothing different, the protocol is easy to get accepted and bootstrapped. In DATA, token distribution is

not based on a simple time-based model, but a more sophisticated reputation-based model. Having users’ activity

logs and reputation data available in the P2P mobile storage enables the system to effectively detect fraud while in

simultaneously as determining the reward distribution.

Blockchain Data Foundation | 14

Page 15: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Table 1. Comparing DATA Token (DTA) with Basic Attention Token (BAT)

2. AdChain [4]

AdChain uses an ERC20 token, named adToken (ADT), as well as a set of smart contracts on Ethereum network.

The idea is to build and maintain a decentralized registry of none-fraud publishers, in other words a shared

whitelist, via decentralized voting. The project and its token does not aim to solve other problems in the industry, nor

are they capable of doing so. The idea of shared whitelist seems good, but faces many practical challenges.

a) Whitelist is not the holy grail for fraud prevention. First it would not be up-to-date. There are thousands of

new sites and applications being created and released every single day, but it takes time for those sites to

be part of whitelist. Second it would not be comprehensive, with millions of different sites and applications

on Internet, many of them being long-tail sites, and thus it is almost impossible to generate a comprehensive

whitelist of legitimate publishers.

b) Benign voters are not familiar with fraudulent sites. As stated in the introduction section, detecting fraud is

more of a political problem than a technical one. Without sufficient and clear tracing data, one can hardly

distinguish the fraudulent sites from the legitimate ones.

Basic Attention Token DATA Token

Type of Token Application Token Protocol Token

Area of Usage Within Brave bowser Entire internet

Blockchain Technology Ethereum ERC20 Token A Standalone Blockchain

Where’s Users’ Reward From

Advertisers buy Token (Impractical)

Distributed by the system in a “Mining” Process

Governance Centrally Managed by Brave company Managed by community

EfficiencyLow efficiency due to

Ethereum’s own limitationHighly efficient via

Tendermint & State Channels

Reward Determination Simple time-stamped User Reputation Modeling

Ad FraudDetection post-fact and still prone to

fraudPreventive at device level before

damage is propagated

Blockchain Data Foundation | 15

Page 16: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

c) The voting mechanism itself is subject to attack. As voting is done by individual accounts and the mapping

from real-life entities to Ethereum accounts is one-to-many, malicious voters can easily hack the system by

voting from many accounts under their control.

d) The project does not clarify many edge cases to make the system a really functional one in all scenarios.

These edge cases include how to handle unpopular sites and sparse voting, how to prevent attacks, what

the incentives for token holders are, and how to prevent legitimate publishers from becoming malicious after

they are classified into the whitelist.

To summarize, AdChain is a nice initiative to use smart contracts on Ethereum and crowd source of wisdom to build

publisher whitelist. However, the whitelist itself is not a holy grail for fraud prevention, as AdChain’s voting

mechanism is subject to attack, as its approach in relying on voters’ wisdom falsely underestimates the difficulty of

fraud detection for individual players, especially in absence of traceable data.

3. AdEx [5] and Papyrus [23]

The AdEx project aims at building a decentralize d ad exchange with Ethereum smart contracts. To support that,

the AdEx project contains a publisher portal, an advertiser protocol, an AdEx profile, and a publisher side AdEx SDK.

The publisher protocol is a client-side DApp used for publisher registration, registering websites/channels and

advertising properties, and most importantly for accepting particular bids. Likewise, advertiser protocol is a client-

side DApp used for advertiser registration, creating different campaigns and placing bids over advertising space.

The AdEx profile is a client-side DApp that allows user to change their preferences regarding advertising. AdEx SDK

is a HTML5 based publisher SDK for ads display and reporting to the blockchain.

Papyrus is a similar project to AdEx. It also builds a decentralized ad exchange solution, with different

decomposition from AdEx, but mostly the “d” counterparts of traditional digital ads players, like “dSSP”, “dDSP”,

“dDMP”, etc. Papyrus is also built on smart contracts but with integration of state channels, Papyrus enables real-

time bidding following the “dRTB” protocol they propose.

AdEx and Papyrus present feasible smart contract based decentralized ad exchange solutions. AdEx’s focus is

direct bids for large conversion goals, instead of real-time bidding what Papyrus handles. However decentralized

ad exchange does not solve current pain points in the digital ads industry. It’s good to have if a lot of advertisers

and publishers already moved to the blockchain space, but it doesn’t help solve current problems like fraud traffic,

ad blocking, lack of user incentive etc. Overall, we see AdEx and Papyrus as good trials into the blockchain space

with DApps, but they do not constitute the infrastructure of such a system. They can be nice complements to DATA

ecosystem, and we will look into the possible integration.

Blockchain Data Foundation | 16

Page 17: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Figure 4. DATA Technology Stack

Blockchain Data Foundation | 17

DATA Technology Design

DATA technology stack is composed of four layers: P2P Mobile Storage layer, Blockchain layer, SDK Management layer and Application Process layer.

It is our attempt to steer toward a clear path where a set of wholesome solutions can be presented.

Page 18: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

1. P2P Mobile Storage Layer In order to prevent the message from broadcasting in the system and ensure the fully decentralization of the

system, DATA system leverages on the distributed Mobile Metadata Management system (M3 or M Cube) to

manage the node reputation value and evidences for blockchain. M3 uses distributed hash table (e.g. Chord[17] ,

Kademlia[18]) protocol to manage nodes in a distributed manager. Inspired by the IPFS system, M3 is targeting on

lightweight metadata management in mobile devices.

In DHT, every node only needs to maintain connections with O(log(n)) of nodes in the system. For a node query,

instead of broadcasting the query messages to all the nodes, it only needs query O(log(n)) nodes. Figure 4.1 shows

that as the number of nodes increase in the system, the number of nodes that need to be contacted is small.[28]

Figure 4.1 Scalability of the nodes

The DHT is widely used in IPFS[16], BitTorrent [19] to increase the scalability of the system. A number of open

source implementations of DHT are available on GIthub [26] as well. M3 is a mobile version of the DHT tailored for

blockchain metadata management of mobile devices. According to a survey from Pew Research Center [27], cell

owners under 50 rarely turn their phones off. Their mobile devices maintain a constant existence online that turns

into stable points in the internet to form a DHT as the churn is rather insignificant. To scale up the availability of

DHT, M3 also uses super nodes as part of DHT, which are the static VMs in the cloud maintained to provided high

availability and reliability. These static VMs are bootstrap nodes that if there is no mobile peers available in the

system, the storage layer is still functioning at these nodes. They also serve as NAT servers for mobile nodes for IP

Blockchain Data Foundation | 18

Page 19: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

address tracking if the cached IP in mobile nodes has expired. The super nodes are contributed by the community in

order to ensure the transparency of the system, which is similar to the miner machine.

Figure 4.1 shows an overview of the M3 overlay. M3 consists of two types of nodes: Super Node and Mobile Node. A

Mobile node does not necessarily have to be a mobile phone- it can be a laptop, desktop or any device that has

storage availability accessible via internet. A mobile node acts as a storage node until the device is shut down.

Both types of nodes will be awarded with tokens for the duration of time and the amount of storage each

contributes to the net.

Figure 4.2 DHT P2P Overlay

In the following sections, we will take Chord protocol as an example to elaborate how M3 leverages DHT for efficient

file storage and lookup. Basically, the M3 is designed to do the following:

a) uploading evidence and reputation values generated and stored in the mobile storage in a distributed manner;

b) managing churns (i.e. length of time when a node joins and leaves the topology)

c) providing APIs for file look up.

In M3 protocol, each node has two operations for the file management:

(1) , which puts the file with its hash key into the DHT Store(key, val )

Blockchain Data Foundation | 19

Page 20: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

(2) , which retrieves the file based on the key

Unlike the broadcasting protocol that broadcasts the query to all the nodes in the topology, the store and retrieve

protocols can achieve complexity, where n is the number of nodes in the system. To achieve this, each

node needs to manage a finger table. As shown in Figure 5, each node keeps a finger table containing up to m

entries, where m is the number of bits in the hash key. The entry of node n will contain successor

( ). The first entry of finger table is actually the node's immediate successor. Every time a node

wants to look up a key k, it will pass the query to the closest successor or predecessor (depending on the finger

table) of k in its finger table (the "largest" one on the circle whose ID is smaller than k, until a node finds out the key

is stored in its immediate successor.  DHT is like a distributed skip list. Each time you go 1/2 way towards

the destination.

In order to further enhance the file availability, we use erasure code to encode the file chunks and distribute them in

the Chord. An erasure code is a forward error correction (FEC) code under the assumption of bit erasures (rather

than bit errors), which transforms a message of k symbols into a longer message (code word) with n symbols such

that the original message can be recovered from a subset of the n symbols.

We will discuss more details on how M3 works in the following sections.

Figure 5. Example of DHT Finger Table

val = Retr ieve(key)

O(log(n))

ith

(n + 2i−1) mod 2m

Blockchain Data Foundation | 20

Page 21: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

1.1 Mobile Node Join/Leave

For each node in the system, it must have a node id. We use SHA-1[21], which is a consistent hash function to

generate the node id based on the device id. The consistent hash function can ensure the hash collision probability

be extremely small. At beginning, all the super nodes will form a initial bootstrap DHT. When a node i joins the

DATA system for the first time, it generates a node id using the SHA-1 hash function. Then,

a) It contacts any bootstrap node n' (i.e., super nodes) for its successor by using find_successor(n') as shown in

Figure 5.1. The super nodes will help the new join node to establish its finger table as shown in Figure 5.2. The

finger table also store the IP address associated with the Node IDs. The file querier can use the IP address to

directly ask for files

b) Node i then Notify the nodes to update their finger tables and predecessors make sure they must point i. The

nodes are in the ranges of .

c) Then the network need to move responsibility for all the keys to the nodes that is now the successor. It would

involve moving the data associated with each key to the new node. Node can become the successor only for

keys that were previously the responsibility of the node immediately following. So only needs to contact that one

node to transfer responsibility for all relevant keys.

// ask n to find the successor of id

n.find_successor(n'){

if id in (n, successor]

return successor

else n’= closest_ preceding_node (id)

return n’.find_successor(id)

}

// search for the highest predecessor of id

n. closest_preceding_node(id) {

for i = log N downto 1

if (finger[i] in (n,id)

return finger[i]

return n

}

Figure 5.1 The pseudocode to find the successor node of an id

IDi

[i − 2m, pred(i ) − 2i + 1]

Blockchain Data Foundation | 21

Page 22: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

n.init_finger_table(n') {

n.successor = n'.find_successor(finger[i].start)

predecessor = successor.predecessor

successor.predecessor =n

for i = to m-1{

if (finger[i+1].start in [n,finger[i].node]){

finger[i+1].node = finger[i].node

} else {

// ask n' to find other nodes

finger[i+1].node=n'.find_successor(finger[i+1].start)

}

}

}

Figure 5.2 The pseudocode to init_finger tables of a new join node

When a node leaves the M3, the node sends a leaving message to all the nodes in the finger table and the

corresponding nodes will update their finger table. The leaving nodes will also transfer their responsible files to its

successor.

To ensure correct lookups, all successor pointers must be up to date. That is, a stabilization protocol as shown in

Figure 5.3 should be running periodically in the background. Each node i asks its successor for its predecessor. If the

predecessor is not itself and let says it is node p, it will contact the node p and set p as the successor. node p will

also set node i as predecessor.

When a node joins or leaves the network, the responsibility of at most O(K/N) keys changes hand (only to or from

the node that is joining or leaving. When the N is large, the impact of the key transfer is small.

n.stabilize() {

x = successor.predecessor;

if (x in (n, successor))

successor = x;

successor.notify(n);

}

Figure 5.3 The pseudocode to stabilize the DHT

Blockchain Data Foundation | 22

Page 23: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

public Interface Node extends Remote {

// Create NodeId

public void create() throws AlreadyConnectedException, IDNotFoundException, RemoteException;

// Notify the Predecessor

public void notifyNode(Node possiblePredecessor) throws RemoteException;

// Join DHT

public void join(Node connectedNode) throws RemoteException;

// Look for successor

public Node find_successor(Key id) throws RemoteException;

// add Successor

public void addSuccessor(IdKey id, int index) throws RemoteException;

…}

Figure 5.4 Sample Interface of the DHT Nodes

With high probability, any node joining or leaving, an N node Chord network will use messages to re-

establish the Chord routing invariants and finger tables.

1.2 File Erasure Encoding

In order to increase the availability of the files in the DHT, we use erasure code to store redundant files in the DHT.

For a reputation evidence of size M, we split the log into k chunks, each of the same size . Then we apply the

code on these chunks to get n chunks, each of the same size . Now the effective size is . Thus the

file is expanded times. We need to set n to be greater than or equal to k, so that is at least . If n equals k,

you will have just split the file and there is no coding performed. Any k chunks out of the n chunks can be used to

retrieve the specific file. So this also means that the code can tolerate up to erasures. Figure 6 shows an

example of a code.

O(logN)

M /k

(n , k) k M /k n M /k

n /k n /k 1

(n − k)

(4, 2)

Blockchain Data Foundation | 23

Page 24: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Figure 6. Example of Erasure Coding

Those erasure encoded chunks are distributed into different nodes in the DHT. For example, if the file is

encoded, we will distribute the 4 chunks to 4 different nodes in the DHT. If any two of the nodes are available in

DHT, the original file can be recovered.

1.3 File Store/Lookup

In DATA system, each node is preloaded with a set of hash functions with a certain order. The set of hash functions

will be used in File store and look up process.

After we generate the file chunks based on erasure coding, we need to publish the file chunks into the DATA

storage system. The file storing process consists of the following 4 steps:

a) Generate the file chunks based on erasure coding as discussed in Section 1.2.

b) Since we need to publish k chunks into the DHT system, we use k consistent hash functions to generate k chunk

ids based on the node id as . The node id refers to the node that

originally own the file.

c) Publish k chunks into the DHT using Store Function: . Since and are

generated using the same suits of hash functions, the and are in the same storage space.

d) Once node i tries to validate the reputation values of node j, it uses the same set of hash functions as used by

node j to generate a set of . Then, the node calls to

retrieval . For each node relaying nodes in the DHT, upon receiving a query for , a node

checks whether it stores the item locally. If not, the node forwards the query to the largest node in its finger table

that does not exceed id. Otherwise, it will forward back the Chunk to the verifier.

(4, 2)

(n , k)

Chunk IDk = Hashk(NodeId , Chunkk)

Store(Chunk IDk) Chunk ID NodeID

Chunk ID NodeID

Chunk IDk = Hashk(NodeID) L ookUp(Chunk IDk)

Chunk IDk Chunk ID

Blockchain Data Foundation | 24

Page 25: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Figure 7. Example of Erasure Coding

The validator will send queries to the nodes in the DHT one by one until it receives chunks so that it can reduce

the whole traffic in the DHT. The verifier recovers the original encrypted reputation logs and use node i's public key

to decrypt the logs. Then the verifier needs to run the reputation model based on the behavior log to verify if the

reported reputation value is corrected or not.

1.4 File Logging

Since we need to prevent the local user to change the activity logs, those logs are encrypted with owner's private

key. Any changes on the file will prevent the file being decrypted. Similar to the Kafka logging system, the file in

is append only. Every file chuck has an expiration date in order to keep the disk usage of the mobile device as small

as possible.

The distributed P2P based mobile storage M3 can be separated out from the DATA system as an independent

decentralized file system solution. It can serve as a mobile centric data storage solution to support mobile based

blockchain applications for content delivery purpose. Also the mobile devices in the storage system can be mobile

phone, mobile PC, tablet and so on.

1.5 Comparison with the IPFS[16].

The InterPlanetary File System (IPFS) is a peer-to-peer distributed file system that seeks to connect all computing

devices with the same system of files. IPFS could be seen as a single BitTorrent swarm, exchanging objects within

one Git repository consists of a distributed hash table, an incentivized block exchange, and a self-certifying

namespace. M3 shares some similarities with the IPFS that tries to offer a decentralized services based on a

distributed hash table. The unique features of DATA system includes:

k

M3

Blockchain Data Foundation | 25

Page 26: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

a) Unlike IPFS that treats all the nodes the same, M3 is designed with super nodes and peer nodes to deal with

unique challenges in the mobile storage environments.

b) Unlike IPFS that heavily use GIT to manage file versions which is unnecessarily heavy in the mobile

environments, M3 uses append only log similar to the Apache Kafka[25], which is super light weight.

c) Unlike IPFS uses BitTorrent protocol to coordinate networks of untrusting peers (swarms) to cooperate in

distributing pieces of files to each other, which is too heavy to the mobile environment, M3 is leveraging

awarding tokens and AI based reputation management system to encourage the node cooperation.

d) M3 further uses ensure code to better enhance the file distribution efficiency, which is missing in IPFS.

e) In M3, the user identity is presented as a one-way hashed value, which can protect the user privacy. Meanwhile,

the file chunks stored in each node are append only and are encrypted with private keys with a salt value. The

security of the file can be protected in the mobile storage level as well.

In general, M3 is tailored for lightweight metadata storage with high mobility, security, trustworthy, privacy and

efficiency. M3 not only can support DATA use case, but also can serve as a fundamental layer and service for other

suitable scenarios for metadata storage in the whole blockchain community.

2. Blockchain Layer 2.1 Consensus Engine

DATA Chain is built on top of Tendermint [11] Consensus Engine, which is very well suited for scaling delegated

proof-of-stake (DPoS) blockchains. More specifically, we’re going to build DATA from a forked code base of

EtherMint [12], which is a high speed implementation of Ethereum on top of Tendermint. Tendermint is chosen

because of its system sophistication and availability:

a) It offers Byzantine Fault Tolerant DPoS consensus. Byzantine fault tolerant means the network is able to tolerate

up to 1/3 of nodes being malicious. DPoS is the advancing target of blockchain technology, as it's more energy

efficient. Individual validators (like miners in PoW systems) in DPoS systems are strongly incentivized against

acting malicious.

b) Tendermint sits at the consensus layer and provides a set of ABCI (Application Blockchain Interface) for

developers to build customized blockchain solutions on top of it. This kind of layered architecture is very

developer friendly to us.

Blockchain Data Foundation | 26

Page 27: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

c) Tendermint is much faster and more scalable than Bitcoin and Ethereum because of its DPoS engine. In a PoW

system, users typically wait for a few confirmations (around 6) to conclude that the transaction is “final”.

Therefore, it takes about 60 minutes for Bitcoin and 2 minutes for Ethereum to mark the finality of a transaction.

Throughput wise, Bitcoin only allows for about 3 transactions per second and Ethereum allows for about 10

transactions, whereas Tendermint reliably supports 10,000 transactions per second at 1 second latency. The

numbers make Tendermint a very favorable system choice.

2.2 Proof of Attention (PoA) based Token Reward

In DPoS systems, validators (like miners in PoW systems) need to be rewarded for their contribution to the network.

In DATA, users and publishers get most of the reward for their attention and data contribution.

Tokens are to be distributed as following manner:

Initial Launch:

The token supply of DATA Tokens (DTA) at initial launch will not exceed 12 billion tokens, out of which no more than

40% will be sold to Token investors, and the rest belongs to team, advisors, and Blockchain Data Foundation,

subject to vesting terms.

PoA Mining-like Process:

The same amount of tokens as the supply at initial launch will be distributed as Attention Reward in the mining-like

process with the following allocation:

(1) 10% to validator nodes in the system

(2) 20% to publishers

(3) 70% to end users

Each relevant contributor is properly incentivized according to the following principles:

• Rewards for users and publishers are issued on a daily basis and follow this “Proof of Attention” (PoA) rules.

• Users daily rewards depends on its attention contribution represented by its reputation determined by

validators.

• Rewards for validators are issued on each block creation following DPoS rules.

The attention reward distribution amount has a halving schedule similar to that of Bitcoins (e.g. halving about every

4 years). And when the newly minted amount diminishes, we expect DATA and DATA Tokens to become industry

protocol and widely accepted. That is the time when advertisers start to purchase DTA as the currency in the ad

Blockchain Data Foundation | 27

Page 28: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

flow, and the token flow gradually substitutes current money flow in the digital ads ecosystem. The DTA currency

represents the real value of the opportunity cost of user attention, which is highly relevant to the user acquisition

cost. Given that the aggregate market value of Internet is continuously growing while the total cyber attention of

humankind is limited to the entire population on the Internet, theoretically the value of DTA will keep increasing

with the time being.

2.3 State Channels

Canonical blockchains are limited to their scalability due to the decentralized nature of transactions: each

transaction needs to be processed every single network node. Current blockchain latency and throughput cannot

even satisfy the need for currency transactions, not to mention the need for massive digital advertising transaction:

clicking and displays, and real-time bidding; they are both orders magnitude more than currency transactions.

To scale blockchains, the blockchain community has studied three directions: larger blocks, sharding and state

channels:

LARGER BLOCKS

is a linear scaling solution,

and it introduces

centralization: only advanced

entities with specialized

hardware can run blockchain

nodes when the block size

grows too large. In the

meantime, larger blocks

improves throughput but not

latency; it brings down

transaction fees but does not

support zero fee

micropayment.

SHARDING

technology subdivides the

network into subnetworks;

transactions between parties

within a subnetwork are

processed much faster and

subnetworks are synchronized

with the main network.

However sharding is not fully

mature yet; there are proposals

like Ethereum 2.0 and Zilliqa

but they are not in production

and not well tested yet.

STATE CHANNELS

in contrast, is a more mature and favorable

choice of technology. The idea of state

channel is to use off-chain channel between

pairs of parties and networks of such paired

channels to process fees less peer-to-peer

micropayments. Those micropayments do not

need confirmation from the whole network,

therefore they are virtually instantly fast. There

are already projects on state channels for

high-speed payments such as the Raiden

Network [13] for Ethereum and Lightning

Network [14] for Bitcoins and Litecoins. In fact,

Lightning network is already in production for

Litecoins.Having studied three directions for scaling, we had decided that state channel is a more favorable choice. Therefore

we will implement similar technologies like Raiden Networks in DATA.

Blockchain Data Foundation | 28

Page 29: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

2.4 Smart Contracts

Building based on Ethermint means DATA has natural support for Ethereum virtual machines and smart contracts.

We will develop smart contract APIs to interact with the P2P mobile storage and the state channels network. That

makes smart contracts on DATA more powerful, and makes DATA one of most advanced and full fledged

blockchain stacks for various kinds of online advertising applications, or even applications in other areas.

3. SDK Management Layer

3.1 Open Source SDK

Since we treat SDK as an Oracle to manage the P2P storage system and the reputation of a user, we will release

the frontend SDK as an open-source project maintained by DATA community so that the public can audit the

credibility of the algorithms and the code. The mobile SDK has the following functionalities:

a) Provide application level services such as ad fraud prevention service for ad networks and DSPs and etc. We

will discuss details in Section 4;

b) AI based reputation modeling to determine the reputation value of a user based on the activities logs;

c) P2P mobile metadata storage managements

3.2 Game theory based Incentive Modeling

Game theory is a theory of applied mathematics that models and analyzes interactive decision situations. Based on

whether the players make binding agreements in the game, game theory models can be classified into cooperative

game models and non-cooperative game models. In the former, the players act based on their binding agreements.

In the latter, the players are self-enforcing entities (i.e., nodes can change their strategies at any time to maximize

their benefits).

We use to denote the set of all mobile nodes (i.e., game players) in the system. We use to denote

the action set for node , and ; the (i.e., cooperative) action means the node will not hack the system,

while the (i.e., incooperative, non-cooperative) action means it hacks the system and be malicious. The action

chosen by node i is denoted by , and the actions chosen by other nodes are denoted by an action set:

𝒩 = {1,2,...,n} Ai

i Ai = {I, C} C

I

ai

a−i = {a1, a2, a3, . . . ai−1, null, ai+1, . . . , an} .

Blockchain Data Foundation | 29

Page 30: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

denotes the action set of all the nodes in the system when

report reputations. We use to denote the Cartesian product of the action set of a node, use to denote

the utility (i.e., payoff, benefit) function of a node i given the strategies used by other nodes and use ( ) to

denote the sum of the utilities of all nodes. The game theory model for the system is denoted as: given a normal

form of game , . Every rational node in the system intends to choose an action that

maximizes its utility for a given action tuple of the other nodes. That is, the best action is the

of node i to iff for all other ,

A Nash Equilibrium (NE) is an action tuple that corresponds to the mutual best response. Formally,

the action tuple is a NE if for and , where

denotes the action set (cooperative, non-cooperative) for node i.

Therefore, a NE is an action set where no individual rational node can benefit from unilateral deviation.

An outcome of a game is non-Pareto-optimal if there is another outcome which would give all

players higher payoffs, or would give partial players the same payoff but the other players a higher payoff. An

outcome is Pareto-optimal if there are no other such outcomes.

Therefore, the ultimate goal of the non-cooperative model is to make the cooperation behavior as both Nash

equilibrium and Pareto-Optimal.

In DATA system, three kinds of nodes will be awarded: DATA nodes, infrastructure contributing nodes and user

attention contributing nodes. Those cooperative nodes will be awarded with tokens to increase their incentives. The

malicious nodes will be punished by putting them into the blacklist. The awards/punishments that we are designed

will guarantee the cooperative behaviors are both Nash Equilibriums and Pareto-Optimal.

3.3 Reputation Management

DATA SDK leverages Artificial Intelligence (AI) to calculate the reputation of the users, which reflects the

trustworthiness of the users. DATA also evaluate advertisers’ reliability based on the collaborated rating from peers.

In order to ensure the peer consensus for the reputation value, the rating and activities are encrypted with private

key of owners and put them into blockchains. The AI model is published with the SDK so that the peers can use the

model to verify the reputation value based on the activity logs. The reputation models can be easily extended to

other scenarios such as online retail, online banking and cyberbully and etc. for reputation management to prevent

fraud. The sections below will give the details of the reputation management.

a = (ai, a−i) = {a1, a2, a3, . . . ai−1, ai, ai+1, . . . , an}

D Ui(ai, a−i)

U(a)

G G = < 𝒩, D, Ui(ai, a−i) >

a*i ∈ Ai

best response a−i ai ∈ Ai Ui(a*i , a−i) ≥ Ui(ai, a−i) .

Definition 1 .

a* = (a*1 , a*2 , a*3 , …, a*n ) Ui(a*i , a*−i) ≥ Ui(ai, a*−i) ∀ai ∈ Ai ∀i ∈ 𝒩 Ai

Definition 2 .

Blockchain Data Foundation | 30

Page 31: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

3.3.1 Publisher Reputation Modeling

In order to distinguish the malicious users and cooperative nodes and give a evaluation of the quality of the user,

we are using Long Short-Term Memory (LSTM) [20] to learn the historical malicious nodes and cooperative nodes

based on the historical logs. The model is trained offline based on TensorFlow[22] and is supplied with the SDK so

that the user that uses SDK can use the same model to calculate/verify the reputation values.

An LSTM block is composed of four main components: a cell, an input gate, an output gate and a forget gate. The

cell is responsible for "remembering" values over arbitrary time intervals; hence the word "memory" in LSTM. Each

of the three gates can be thought of as a "conventional" artificial neuron, as in a multi-layer (or feedforward) neural

network: that is, they compute an activation (using an activation function) of a weighted sum. Intuitively, they can

be thought of as regulators of the flow of values that goes through the connections of the LSTM; hence the

denotation "gate". There are connections between these gates and the cell. Some of the connections are recurrent,

some of them are not.

Figure 8. LSTM Cell

The SDK layer will track the click activities of users before/during/after viewing advertisement. Since this activity

data is time-series data, we use a sliding window of size across the data to generate training sets. The basic

sliding window size is day. Each sliding window is labelled with a reputation value scale from to with for

each step. indicates the malicious nodes and indicates the dedicated attention contributor. The value in between

indicates the different level of attention each user has put into the model. Those time series activity data will encode

the information such as the number of user views a day and the length of time a video advertisement is viewed for.

It can also encode whether the user has clicked on the advertisement. Together with these time series activity data,

the inputs of the model also include device type (e.g. iOS, Android, AR device), App type (e.g. Game App, Social App

N

1 0 1 0.1

0 1

Blockchain Data Foundation | 31

Page 32: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

and etc.), location (e.g. Beijing, New York) and so on. All these advertisement related features are fused into the

model to measure the quality of a user in a multiple-dimensional way.

The LSTM's training model looks like the figure below. The time-series training sets are the normalized users click

logs, which are the inputs of the model. The outputs of the model are the reputation values. The reputation values

are calculated based on SoftMax functions.

Figure 9. LSTM Architecture

The trained model is loaded into the SDK Management Layer. In the SDK layer, we will calculate the reputation

value within a monthly moving window. That is, the user must accumulate 1 month’s worth of click logs before get

a reputation value based on the LSTM model. Section 3.3.3 will discuss why we need to have a one month’s worth

activity log. When calculating a reputation, a user creates a feature vector including a week’s worth of activity logs,

location, device type, app category. The input vector is supplied into the model which then calculates the reputation

value of the user based on the inputs.

The click log and the associated reputation value will be transferred into the distributed mobile storage and

blockchains. When a user tries to verify the reputation value, it will find the activity log of the user and use the same

model to generate the reputation value of a user.

Blockchain Data Foundation | 32

Page 33: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

3.3.2 Advertiser Reputation Modeling

In order to prevent advertiser/ad networks from supplying malicious advertisements to the publishers, each viewer

in the system can assign a like/unlike rating of the advertisements based on advertisement user experiments. If the

advertisement is malicious, the SDK also supplies a API to report the malicious behaviors. All these ratings and

malicious reporting will be stored in the distributed mobile storage and reported to the blockchain. The reputation of

an advertiser is a weighted sum of the rating from different users i as:

where is the rating of user i and is the reputation of user i. That is, we will give more rating weights to the

nodes with high reputation values.

3.3.3 Attack Analysis on Malicious Nodes

Since DATA system use an oracle to calculate the reputation value of a user based on the activity logs, we need to

prevent or reduce the impacts of malicious nodes if they fake their activity logs and transmit them into the

blockchains. First, we grant user tokens only when they generate 1 month’s worth of valid activity log. The AI model

will validate the activity log. This policy can ensure that the malicious nodes are unable to generate a bunch of

device ids and changing them repeatedly. Secondly, before granting the tokens to the users, Blockchain Data

Foundation can check the activity data with the advertiser’s data management platform (DMP) data to ensure

these activities are actually valid. We will also encourage advertisers to put their observed user click data into the

blockchain to automate the verification process.

j

Rj =n

∑1

Ri ⋅ Wi /n ,

Ri Wi

Blockchain Data Foundation | 33

Page 34: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

4. Application Process Layer The built-in application of DATA is fraud detection. Since it supports EVM and smart contracts, all applications

available on Ethereum are also available on DATA. As it supports state channel based micropayments, DATA

Tokens can be used as digital currency in scenarios broader than Bitcoins and Ethereum, like premium content

purchasing, online gifting, real-time bidding etc. Here we describe a few.

4.1 Fraud Prevention

The Fraud Prevention in DATA System is achieved through 3 ways.

a) Reputation Management. As discussed in Section 3.3, based on the AI models, both advertiser and publisher are

rated with a reputation value, which reflects their trustworthiness. The AI models can detect the malicious nodes

with suspicious long term activities and punish them. The peers can rate the advertisers to collaboratively

identify malicious advertisers and blacklist them.

b) Blockchain. Since the activity logs can be accessed in the blockchain consensus layer, users and advertisers can

verify the reputation of each other anytime, everywhere, with high transparency.

c) Reward and Punish Incentives. The DATA Tokens together with the punishments can provide high incentives to

users in the system to be cooperative.

4.2 Micropayment for User Application

We will build desktop and mobile wallets for DATA. The wallet software will automatically determine the assigned

address based on device ID. We will also release SDK too to integrate the wallet into third party applications. As

DATA supports lightening fast micropayment, DTA can be used in all places where fiat currency can be used online,

for instance, purchasing virtual goods, premium content, online subscription, online gifting, etc. Figure [11] illustrates

mock ups of DATA wallets and example applications.

4.3 Decentralized Ad Exchange

As discussed previously, we’ll look into porting of existing smart contracts based decentralized ad exchange

solutions, like AdEx [5] and Papyrus [23] into DATA. The DATA infrastructure naturally supports that.

Blockchain Data Foundation | 34

Page 35: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

5. DATA System Flows Figure [10] illustrates the flows in DATA ecosystem. There are 5 categories of players in the ecosystem: advertisers,

publishers, users, DATA network and Blockchain Data Foundation, and there are three functionality flows: ad flow,

data flow and token flow.

Figure 10. DATA System Flows

AD FLOW

is from advertisers/ad networks/DSP to

publishers/developers and then to end users.

This is no different from traditional ad flow. In

future development of DATA, when tokens

substitute money in the ad flow,

decentralized exchanges, bidding, DSP and

SSP will be involved as discussed in the

“Application layer” section.

DATA FLOW

is from user device to P2P

based mobile storage. The

SDK transforms individual

devices into nodes of the

mobile storage network.

Then data in the storage is

queried and validated by the

DATA nodes.

TOKEN FLOW

is from DATA network to

users, publishers/

developers as well as DATA

Nodes. After DATA network

validates data, detect fraud,

it issues tokens as

“coinbase transactions” to

relevant contributors.

Blockchain Data Foundation | 35

Page 36: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Figure 11. DATA Coin Use Case

A Developer Registry, a DApp itself, allows developers and publishers to register, create wallets and manage their

applications.

DATA can serve as a fundamental service layer in the decentralized and shared mobile ecosystem, and collaborate

with other platforms running with DATA layer, such as decentralized App Stores and mobile SaaS platforms. Use of

DATA Tokens can be applied to any App Store or platform that supports DTA as a third party payment, for users to

purchase on premium services or IAP (in-app purchase) in apps or games. Figure 11 demonstrates a typical use

case of DATA Tokens.

Blockchain Data Foundation | 36

Page 37: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Yomob is a global mobile SaaS platform focusing on monetization service for developers. Its mission is to empower

mobile developers to optimize and monetize efficiently based on its programmatic IO experience, big data and AI

technology. The company is based in San Fransisco, Los Angels USA and has offices in Beijing, Guangzhou and

Berlin Germany. Yomob partners with over forty leading global mobile ad networks and DSPs such as mobile video

advertisements, playable advertisements and AR advertisements demand side platforms, including Facebook,

Google, Bluefocus, Unity, Vungle and etc. Yomob has served more than 1 billion end users worldwide from over

2000 mobile developers on its platform while the numbers of both users and developers are still growing

dramatically.

Yomob’s Technology

SAAS

Yomob provides professional

BI and SaaS platform

services focusing on

advertising and in-app

purchase monetization

optimization.

BIG DATA

The Yomob team has industry

experience in big data. The team

operates a global distributed

cloud based network for

supporting big data service on

Yomob. Currently Yomob global

big data platform can process

tens of billions of data per day.

ARTIFICIAL INTELLIGENCE

The Yomob team has extensive

experience in utilizing AI technology

in monetization of mobile

applications. With a team of

industry leading technologists and

experts, Yomob is proficient in

applying cutting-edge artificial

intelligence technologies in

monetization.

Yomob’s Business The next generation mobile ad format has increasingly become the top performer of mobile advertisements for

games and applications – but along with it, the cost for developers to manage it is also on the rise. With the

Blockchain Data Foundation | 37

Innovation Partner

The vision and mission of DATA is only achievable through the support of platform partners and developers who trust the value of DATA Project. DATA is currently working with a strategic partner, Yomob International Co., Ltd., a unified mobile ad global monetization platform to develop the blockchain platform and early applications.

Page 38: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

application of machine learning and AI, Yomob offers a solution: global mobile advertisement monetization by

matching and optimizing the flow of buyer demand with seller inventory.

Yomob coined the phrase “MaaS,” or Monetization as A Service, to describe the objective: to take a developer

audience and monetize with higher return. Yomob has risen quickly as the leader in optimizing the placement of

advertisements, substantially increasing the advertisements revenue stream for mobile developers.

Figure 12. Illustration of Yomob’s Business

Ineffective advertising has always been a key problem in retaining the best user experiences and achieving the best

timing and placement for every advertisement across every demand-side advertiser and ad network SDK -- from

the cost of testing multiple iterations to the opportunity cost of siphoning off the time and attention that mobile

game and application developers should be spending on their core competencies.

As an ad exchange platform, Yomob focuses on video advertisement at the current stage and is integrated with

more than 50 major video ad networks and DSPs. As an aggregated ADX, Yomob can claim impartiality through a

wide range of advertiser bids. AI-powered programmatic head bidding and a BI dashboard also offer greater

transparency, so that both sellers and publishers can see the payout, or remove unsuitable ads.

Yomob’s approach integrates an understanding of the applications’s user, the users’ psychology, and the nature of

the ad to match them at the right time, with the right users, at the time when they will be most interested in clicking.

The focus is achieving the best performance and least disruption for users, within applications.

Blockchain Data Foundation | 38

Page 39: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

In order to reduce costs, improve user experience, and boost revenue, Yomob offers what it calls a “zero rev share”

initiative, in which the developer gets the full payout from the advertising campaign that is displayed and watched

by the users.

Blockchain Data Foundation | 39

Page 40: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Josh Burns

Josh is an experienced consumer internet business leader focused on helping to drive revenue, reach and

engagement for both early to mid-stage consumer internet companies developing compelling products for both

mobile and desktop as well as businesses from traditional industry entering the mobile landscape. He has a specific

focus on the video game industry and melds a data driven approach coupled with a creative eye to drive increased

product engagement and revenue. He has deep experience with partnerships as well as international markets in

the mobile gaming sector. Previously, he worked at 6waves, co-founding the US office and leading the US product

management team for one of the largest publishers of games for Facebook, iOS & Android, where he managed &

launched over 100 apps including those from top developers like Kabam, Nexon & Atari, as well as games based on

IP from Eminem, Disney, Dungeons & Dragons, Starz & BBC. Prior to 6waves, he worked at Electronic Arts in EA’s

Pogo.com division, supporting one of the largest casual game websites, focusing on product management,

customer insights, new platforms, market strategy & analytics. Prior to his work at Electronic Arts, Josh worked at

various companies providing market research and strategy consulting to Fortune 100 companies in more traditional

industries.

Shirley Lin

Ms. Lin is a serial entrepreneur, a seasoned executive in business development in the mobile AdTech sector serving

mobile game/app industry, with extensive relations in Silicon Valley, Europe and China, and specializing in

globalization for cross border operations. Ms. Lin was VP of Business Development at Nexway (French), Yeahmobi

(one of the top Chinese mobile performance marketing networks) responsible for the global expansion in San

Francisco and Berlin. She also served at iConsole.tv and Beintoo (Italian) in the executive rank. Ms. Lin has

technical experiences in operating system level of programming and was an aerospace software engineer in Space

Shuttle Program at NASA, Houston. Shirley holds a M.S. in Computer Science/Math/Statistic from Texas A&M

University and a B.A. in History from National Taiwan University. 

Dr. Eric Li

Dr. Li worked as principal data scientist and architect in Microsoft Azure, Capital One and MicroStrategy in U.S.

focusing on artificial intelligent, machine learning, cloud computing, business intelligent and big data system design

and implementations, FinTech, P2P system and etc. Dr. Li has published more than 50 peer reviewed papers in the

fields of peer to peer networks, distributed systems, online reputation management, social networks and big data

Blockchain Data Foundation | 40

Team

Page 41: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

with more than 800 citations, such as ACM/IEEE Transactions on Networking, IEEE Transactions on Distributed

System, IEEE Transactions on Mobile Computing, IEEE Transaction on Computers, ACM Multimedia and etc. He also

has multiple US patents. He served as committee member of multiple international conferences. He was the

recipient of Chinese Government Award for Outstanding Students Abroad 2011 and Harris Outstanding

Researcher Award in Clemson University 2011. Dr. Li received Ph.D of Computer Engineering from Clemson

University, US and BS from Huazhong University of Science and Technology.

Victor Ye

Mr. Ye has worked for LinkedIn, Twitter and Snapchat in the U.S. as senior software engineer. Victor has technical

expertise in multiple technical dimensions and years of cutting-edge R & D experiences. As academic experience,

Mr. Ye contributed to the fields of data privacy, temporal-spatial data management and distributed database

systems with more than 10 peer reviewed publications and multiple patents. During his time working in the

industry, he worked on multiple cutting-edge open source distributed systems including Apache Kafka and project

Manhattan in Twitter. Mr. Ye has received Master of Computer Science from Columbia University and Bachelor of

Science from Tsinghua University.

Franklin Song

Mr. Song is a serial entrepreneur and cofounded several start-ups including a global mobile game developing and

publishing company SOULGAME which earned the most Apple App Store global game features among all Chinese

companies. Mr. Song has also worked for Microsoft Research Asia and Oracle in the U.S. Mr. Song joined

Decentralized and Distributed Systems Research at Yale University advised by Prof. Bryan Ford and worked on

Dissent Project (a Dining-cryptographers Shuffled Send Network, which is a protocol for accountable anonymous

messaging, voting, and other interactions among members of a decentralized group). Mr. Song has received MS

from Yale University and BS from Tsinghua University.

Henry Zhao

Mr. Zhao worked at Perfect World and Tencent. During that period, Mr. Zhao led the operating and marketing teams

for several extreme successful mobile games with total revenue over $100 mil. Mr. Zhao has received both BS/MS of

Engineering in Tsinghua University.

Han Liao

Mr. Han worked as supply lead of Vungle and drove tens of times revenue growth for Vungle in China. Han also

served as Director of Global BD for WQ Mobile. Mr. Han received M.B.A. from University of La Verne, advanced in

Marketing Planning and Financial Analyzing.

Blockchain Data Foundation | 41

Page 42: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Ashley Zhou

Ms. Zhou worked as product marketer in LinkedIn and led the marketing & operation of LinkedIn career product and

LinkedIn digital advertising sources. Ms. Zhou also served as digital data analyst in Goodby Silverstein & Partners

and provided social media strategy & solution for Cisco. Ms. Zhou received Master of Integrated Marketing

Communications from Northwestern University and Bachelor from Renmin University.

Blockchain Data Foundation | 42

Page 43: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Prof. Shoucheng Zhang (Chief Advisor)

Shoucheng Zhang is the JG Jackson and CJ Wood professor of physics at Stanford University. He is a condensed

matter theorist known for his work on topological insulators, quantum spin Hall effect, spintronics, quantum Hall

effect and high temperature superconductivity. He is a fellow of the American Physical Society and a fellow of the

American Academy of Arts and Sciences. He received the Guggenheim fellowship in 2007, the Alexander von

Humboldt research prize in 2009, the Europhysics prize in 2010, the Oliver Buckley prize in 2012, the Dirac Medal

and Prize in 2012, the Physics Frontiers Prize in 2013, the “Nobel-class” Citation Laureates by Thomson Reuters in

2014 and the Benjamin Franklin Medal in 2015. He is identified as one of the top candidates for the Nobel Prize by

Thomson Reuters in 2014. He has been elected as the member of the National Academy of Science in 2015. Mr.

Zhang is also the founding chairman of Danhua Capital, a VC fund that invests primarily in early stage and growth

stage company with disruptive technology/business model, big market and excellent team.

Michael Arrington

J. Michael Arrington is the American founder and former co-editor of TechCrunch, a blog covering the Silicon Valley

technology start-up communities and the wider technology field in USA and elsewhere. Magazines such as Wired

and Forbes have named Arrington one of the most powerful people on the Internet. In 2008, he was selected by

TIME Magazine as one of the most influential people in the world. In 2017, he founded Arrington XRP Capital, a

digital asset management firm in blockchain-based capital markets.

Shuoji Zhou

Zhou Shuoji is the founding partner of FBG Capital, with extensive experience in digital assets trading and

investment. Vincent is also an early investor of a broad spectrum of blockchain companies and projects. He is

considered as one of the most well-connected and visionary crypto hedge fund managers in Asia.

Bo Shen

Founding Partner of Fenbushi Capital and Blockasset Fund.

Blockchain Data Foundation | 43

Board Of Advisors

Page 44: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Paul Veradittakit

Paul is partner of Pantera. Prior to joining Pantera in 2014, Paul worked at Strive Capital as an Associate focusing

on investments in the mobile space. Previously, he was at Hatch Consulting and LECG and performed business

development and marketing for Urban Spoils, an early stage startup in the daily deal aggregation space. Paul

graduated from the University of California, Berkeley with a B.A. in Psychology and a B.A. in Political Science.

Junfei Ren

Junfei Ren is Secretary of the Board of Directors of Huobi Global, world’s largest crypto exchange. She is also the

founder of Huobi Labs, a blockchain incubator for early stage startups. Prior to joining Huobi, Mrs. Ren worked as

secretary of Mr. Xiaoping Xu, Founder of ZhenFund. Mrs. Ren has also cofounded a blockchain based fin-tech

company with successful exit.

Yusen Dai

Yusen is a partner of ZhenFund. Before joining ZhenFund, Yusen dropped out of Stanford University in 2009 and

cofounded Jumei International LTD (NYSE: JMEI). Jumei is the leading Chinese cosmetics e-commerce retailer and

one of the largest Chinese e-commerce companies. Yusen oversaw Jumei's product design and development,

operation management, online marketing, and management of several categories. Jumei was listed on NYSE in May

2014 at a market cap of $3 billion, only four years after its inception. Yusen attended Stanford University Graduate

School, and received his bachelor degree from Tsinghua University, Beijing.

Bman Lee

Consultant of Alibaba (NYSE: BABA), Lenovo (HKG: 0992), Qihoo (NYSE:QIHU) Co-founder of Lijiaoshou (Acquired

by Baidu) Lead of Baidu AOD platform (served 500,000+ businesses) Active Investor in Blockchain and active

blockchain community contributor since 2013

Satoshi

Satoshi is Partner of DFund. He was VP at Top investment bank in Japan, PM at Top telecom company in Japan and

MD at Global investment funds in Hong Kong and Japan

Kevin Wen

C.S., UT-Ausin Serial Entrepreneur; Co-founder of LightInTheBox.com (NYSE:LITB); Co-founder of Blogchina

Blockchain Data Foundation | 44

Page 45: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Jia Tian

Mr. Tian served as senior developer at Baidu, Inc. and Alibaba, Inc. During that period, he developed large scale

computer systems including the technology behind so.com, supporting more than 100 million page views per day,

and large scale recommendation systems. Mr. Tian is also a serial entrepreneur. He joined the founding team of

several companies focusing on AI and related areas. The first company Wolongyun was acquired by Alibaba, Inc.

Thereafter he joined the Beijing Machine Learning Information Technology company as CTO, designed and built AI

systems including recommendation systems, chatbots, medical image recognition systems. After that he joined

Pony.ai, invested by Sequoia Capital and IDG Capital in the angel round, to build autonomous driving systems. Mr.

Tian serves as the Chief Scientist in bitfundpe.com, a bitcoin fund dedicated to supporting the bitcoin community

since 2013, founded by Xiaolai Li. Mr. Tian is also advisor to multiple blockchain tech startups such as ZCash. Mr.

Tian received BS/MS of Engineering in Tsinghua University, majoring in distributed systems.

Dr. Harry Liu

Harry is Staff Engineer / Senior Manager of Research at Alibaba Group. He was a researcher in Microsoft Research

Redmond Lab from 2014 to 2017. Harry’s research focus is on designing and implementing fundamental network

protocols, algorithms and systems for the future world with prevalent BigData, Internet of Things and Virtual Reality

applications with areas including cloud computing, edge computing, network functions virtualization, software-

defined networking, network management driven by BigData, online-service and content delivery, ultra-low-latency

networking, peer-to-peer networking. Harry has published research papers in top conference like SOSP, NSDI and

SIGCOMM as first author. Harry also won the "2014 ACM SIGCOMM Doctoral Dissertation Award - Honorable

Mention" which is the only honorable mention of this award in this year. He obtained his Ph.D. in Dept. of Computer

Science at Yale University. Previously he received the B.S and M.S. degrees from Tsinghua University.

Blockchain Data Foundation | 45

Scientists

Page 46: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

Investors & Partners

50+ Global Ad Network & DSPs Partners of Yomob

Blockchain Data Foundation | 46

Investors & Partners

Page 47: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

BOOTSTRAP (YOMOB)

PHASE I: DEVELOPMENT AND MARKETING

2018 Q1 Blockchain Data Foundation founded.

2018 Q1 DATA Project institution-only private token sale as ERC20 token on Ethererum.

Marketing strategy formed.

2018 Q2 DATA first prototype initial testing including DTA distribution system and etc.

PHASE II: INTERNAL RELEASE TO TEST ON YOMOB

2018 Q3 Alpha launch of DATA Chain and system, integrated inside Yomob’s SDK (DATA version).

First Go-to-market strategy executed.

Blockchain Data Foundation | 47

Oct. 2016 Yomob successfully served more than 10 mobile app teams for ad monetization optimization while generating over $1 million USD

2012

Jun. 2012 Yomob started as an internal SaaS platform for mobile developers before spun off from its original company.

Jan. 2015 Yomob ad monetization optimization service started development

Jan. 2017 Yomob spun off as an independent entity in global regions and officially released its platform for global developers.

Jun. 2017 Yomob started to explore blockchain technology in Ad tech and SaaS spaces.

Nov. 2017 DATA white paper drafted.

Dec. 2017 Yomob serves over 2000 mobile developers globally with monthly user reach over 120 million, as well as over 50 top ad networks and DSPs world-wide been integrated as key partners.

Roadmap

Page 48: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

2018 Q3 Finish Closed Alpha test with selected participants from developers on Yomob platform.

Distribute DTA with developers, users and miners.

2018 Q4 Conversion of ERC20 based DATA Token to native token.

Closed Beta launch of DATA on Yomob platform with most of its developers.

2019 Q1 Open Beta launch of DATA on Yomob platform. Release Beta version of DATA SDK Protocol.

PHASE III: SOFT LAUNCH TO EARLY ADOPTERS

2019 Q1 Start industry collaboration with initial strategic partners including both ad networks and

developers.

Start building DATA ecosystem and generate DTA.

2019 Q1 Release Alpha Version of M3 for initial testing.

PHASE IV: LAUNCH FOR BROADER ADOPTION THROUGH ECOSYSTEM

2019 Q2 Fully functional DATA system to include wallet, micropayment.

Provide external APIs / SDK solutions for developers to enable in-app purchase for virtual goods

and services to their end users.

2019 Q2 Release Beta Version of M3.

2019 Q3 Partner with selected industry strategic partners such as mobile SaaS service providers, App Stores,

developers, ad networks , DSPs, ad exchanges, SSPs and etc. for utilizing DTA as a currency for

more use cases.

2019 Q4 Official launch of DATA Project and parallel marketing promotion for broad industry adoption.

Open invite to engage partners up- and down-stream of the ecosystem.

Blockchain Data Foundation | 48

Page 49: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

1. Mobile Internet Ad Spending Worldwide, 2015-2020 www.eMarketer.com

2. AdMaster Anti-Fraud White Paper http://www.admaster.com.cn/eng/index.php?c=downloads&a=view&id=102

3. Basic Attention Token https://basicattentiontoken.org/

4. AdChain Project

https://www.adchain.com/

5. AdEx Project

https://www.adex.network/

6. Lumar Partners https://www.lumapartners.com/lumascapes/display-ad-tech-lumascape/

7. RTB China https://rtbchina.com

8. PageFaire 2017 Adblock Report https://pagefair.com/blog/2017/adblockreport/

9. “Ad Fraud Estimates Double”. WPP. Business Insider. March 16, 2017.

http://www.businessinsider.com/ad-fraud-estimates-doubled-2017-3

10. ads.txt by IAD lab https://iabtechlab.com/ads-txt-about/

11. Tendermint Consensus Engine https://github.com/tendermint/tendermint/wiki

Blockchain Data Foundation | 49

References

Page 50: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

12. EtherMint: Ethereum on Tendermint https://blog.cosmos.network/a-beginners-guide-to-ethermint-38ee15f8a6f4

13. Raiden Network

http://raiden.network/

14. Lightning Network

http://lightning.network/

15. Zilliqa

https://www.zilliqa.com/

16. IPFS

https://ipfs.io/

17 Chord

https://github.com/sit/dht/wiki

18. P. Maymounkov and D. Mazieres. Kademlia: A peer-to-peer information system based on the xor metric.

In Peer-to-Peer Systems, pages 53–65. Springer, 2002.

19. BitTorrent

http://www.bittorrent.com/

20. Sepp Hochreiter; Jürgen Schmidhuber (1997). "Long short-term memory".  Neural Computation. 9 (8): 1735–1780. doi:10.1162/neco.1997.9.8.1735. PMID 9377276.

21. SHA-1 https://tools.ietf.org/html/rfc3174

22. TensorFlow https://www.tensorflow.org/

23. Project Papyrus

https://papyrus.global/

24. Piano Tiles 2™

https://itunes.apple.com/us/app/piano-tiles-2/id1027688889?mt=8

https://play.google.com/store/apps/details?id=com.cmplay.tiles2

Blockchain Data Foundation | 50

Page 51: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

25. Apache Kafka

https://kafka.apache.org/

26. WebTorrent

https://github.com/webtorrent/bittorrent-dht

27. Cell Owners Under 50 Rarely Turn Their Phones Off

http://www.pewinternet.org/2015/08/26/americans-views-on-mobile-etiquette/2015-08-26_alone-

together_1_01/

28. Ion Stoica , Robert Morris , David Karger , M. Frans Kaashoek , Hari Balakrishnan, Chord: A scalable peer-to-

peer lookup service for internet applications, Proceedings of the 2001 conference on Applications, technologies,

architectures, and protocols for computer communications, p.149-160, August 2001, San Diego, California,

USA  

29. The ad fraud issue could be more than twice as big as first thought — advertisers stand to lose $16.4 billion to

it this year

http://www.businessinsider.com/thepartnership-msix-and-adloox-ad-fraud-2017-2017-3

Blockchain Data Foundation | 51

Page 52: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

IMPORTANT: YOU MUST READ THE FOLLOWING DISCLAIMER IN FULL BEFORE CONTINUING

The sale (“Token Sale”) of the DATA Token (“DATA Tokens”), the exchange medium for participants of the DATA platform as detailed in this whitepaper (the “Whitepaper”) is only intended for, made to or directed at, only certain persons. Moreover, this Whitepaper is not a prospectus or offer document of any sort and is not intended to constitute an offer of securities of any form, units in a business trust, units in a collective investment scheme or any other form of investment, or a solicitation for any form of investment in any jurisdiction. No regulatory authority has examined or approved of any of the information set out in this Whitepaper. This Whitepaper has not been registered with any regulatory authority in any jurisdiction.

By accessing and/or accepting possession of any information in this Whitepaper or such part thereof (as the case may be), you represent and warrant to Blockchain Data Foundation (to be incorporated) (the “Foundation”) and Wealth Wise Ventures Limited (BVI Company No.: 1965363 ) (the “Token Issuer”) that:

(a) you are not located in the People’s Republic of China and you are not a citizen or resident (tax or otherwise) of, or domiciled in, the People’s Republic of China;

(b) you are not located in the Republic of Korea and you are not a citizen or resident (tax or otherwise) of, or domiciled in, the Republic of Korea;

(c) you are not located in the United States of America and you are not a citizen, resident (tax or otherwise) or green card holder of, or domiciled in, the United States of America, unless you are a U.S. Qualified Person (as defined in the Token Sale Terms (as defined herein));

(d) you are not located in a jurisdiction where the Token Sale is prohibited, restricted or unauthorized in any form or manner whether in full or in part under its laws, regulatory requirements or rules;

(e) you agree to be bound by the limitations and restrictions described herein; and

(f) you acknowledge that this Whitepaper has been prepared for delivery to you so as to assist you in making a decision as to whether to purchase the DATA Tokens.

Blockchain Data Foundation | 52

Whitepaper Disclaimers

Page 53: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

IMPORTANT NOTICE

This Whitepaper in current form is being circulated for general information and to invite investor feedback only on the DATA platform as presently conceived, and is subject to review and revision by the directors of the Token Issuer and/or the Foundation, the advisers, and/or legal advisers of the Token Issuer and/or the Foundation. Please do not replicate or distribute any part of this Whitepaper without this note in accompaniment. No part of this Whitepaper is intended to create legal relations between a recipient of this Whitepaper or to be legally binding or enforceable by such recipient against the Token Issuer and/or the Foundation. An updated version of this Whitepaper may be published on a date to be determined and announced by the Token Issuer and/or the Foundation in due course.

PLEASE READ THIS SECTION AND THE FOLLOWING SECTIONS ENTITLED “DISCLAIMER OF LIABILITY”, “NO REPRESENTATIONS AND WARRANTIES”, “REPRESENTATIONS AND WARRANTIES BY YOU”, “CAUTIONARY NOTE ON FORWARD-LOOKING STATEMENTS”, “THIRD PARTY INFORMATION AND NO CONSENT OF OTHER PERSONS”, “TERMS USED”, “NO ADVICE”, “NO FURTHER INFORMATION OR UPDATE”, “RESTRICTIONS ON DISTRIBUTION AND DISSEMINATION”, “NO OFFER OF INVESTMENT OR REGISTRATION” AND “RISKS AND UNCERTAINTIES” CAREFULLY.

IF YOU ARE IN ANY DOUBT AS TO THE ACTION YOU SHOULD TAKE, YOU SHOULD CONSULT YOUR LEGAL, FINANCIAL, TAX OR OTHER PROFESSIONAL ADVISOR(S).

The DATA Tokens are not intended to constitute securities of any form, units in a business trust, units in a collective investment scheme or any other form of investment in any jurisdiction. This Whitepaper does not constitute a prospectus or offer document of any sort and is not intended to constitute an offer of securities of any form, units in a business trust, units in a collective investment scheme or any other form of investment, or a solicitation for any form of investment in any jurisdiction.

This Whitepaper does not constitute or form part of any opinion or any advice to acquire, sell, or any solicitation of any offer by the Foundation or the Token Issuer to acquire any DATA Tokens nor shall it or any part of it nor the fact of its presentation form the basis of, or be relied upon in connection with, any contract or investment decision.

The proceeds from the sale of the DATA Tokens will be deployed to support ongoing development and growth of the DATA platform, marketing, human resources, sales, and other operational activities.

No person is bound to enter into any contract or binding legal commitment in relation to the acquisition of DATA Tokens and no cryptocurrency or other form of payment is to be accepted on the basis of this Whitepaper.

Any agreement as between the Token Issuer and you as a participant in the sale of the DATA Tokens by the Token Issuer (the “Token Sale”), and in relation to any purchase of DATA Tokens is to be governed by only a separate document setting out the terms and conditions (the “Token Sale Terms”) of such agreement. In the event of any inconsistencies between the Token Sale Terms and this Whitepaper, the former shall prevail.

Blockchain Data Foundation | 53

Page 54: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

PLEASE NOTE THAT YOU ARE NOT ELIGIBLE AND YOU ARE NOT TO PURCHASE ANY TOKENS IN THE TOKEN SALE IF: (A) YOU ARE LOCATED IN THE PEOPLE’S REPUBLIC OF CHINA OR IF YOU ARE A CITIZEN OR RESIDENT (TAX OR OTHERWISE) OF, OR DOMICILED IN, THE PEOPLE’S REPUBLIC OF CHINA; (B) YOU ARE LOCATED IN THE REPUBLIC OF KOREA OR IF YOU ARE A CITIZEN OR RESIDENT (TAX OR OTHERWISE) OF, OR DOMICILED IN, THE REPUBLIC OF KOREA; (C) YOU ARE LOCATED IN THE UNITED STATES OF AMERICA OR IF YOU ARE A CITIZEN, RESIDENT (TAX OR OTHERWISE) OR GREEN CARD HOLDER OF, OR DOMICILED IN, THE UNITED STATES OF AMERICA, UNLESS YOU ARE A U.S. QUAILED PERSON; OR (D) SUCH TOKEN SALE IS PROHIBITED, RESTRICTED OR UNAUTHORIZED IN ANY FORM OR MANNER WHETHER IN FULL OR IN PART UNDER THE LAWS, REGULATORY REQUIREMENTS OR RULES IN THE JURISDICTION IN WHICH YOU ARE LOCATED, AT THE TIME OF YOUR INTENDED PURCHASE OR PURCHASE OF THE TOKENS IN THE TOKEN SALE.

No regulatory authority has examined or approved of any of the information set out in this Whitepaper. No such action has been or will be taken under the laws, regulatory requirements or rules of any jurisdiction. The publication, distribution or dissemination of this Whitepaper does not imply that the applicable laws, regulatory requirements or rules have been complied with.

There are risks and uncertainties associated with the Foundation and the Token Issuer and their business and operations, the DATA Tokens, the Token Sale, and the DATA platform. Please refer to the section entitled “Risks and Disclosures” set out at the end of this Whitepaper.

This Whitepaper, any part thereof and any copy thereof must not be taken or transmitted to any country where distribution or dissemination of this Whitepaper is prohibited or restricted.

No part of this Whitepaper is to be reproduced, distributed or disseminated without including this section and the following sections entitled “Disclaimer of Liability”, “No Representations and Warranties”, “Representations and Warranties By You”, “Cautionary Note On Forward-Looking Statements”, “Third Party Information and No Consent of Other Persons”, “Terms Used”, “No Advice”, “No Further Information or Update”, “Restrictions On Distribution and Dissemination”, “No Offer of Investment Or Registration” and “Risks and Uncertainties”.

DISCLAIMER OF LIABILITY

To the maximum extent permitted by the applicable laws, regulations and rules, the Foundation and/or the Token Issuer shall not be liable for any indirect, special, incidental, consequential or other losses of any kind, in tort, contract or otherwise (including but not limited to loss of revenue, income or profits, and loss of use or data), arising out of or in connection with any acceptance of or reliance on this Whitepaper or any part thereof by you.

NO REPRESENTATIONS AND WARRANTIES

The Foundation and the Token Issuer do not make or purport to make, and hereby disclaim, any representation, warranty or undertaking in any form whatsoever to any entity or person, including any representation, warranty or undertaking in relation to the truth, accuracy and completeness of any of the information set out in this Whitepaper.

Blockchain Data Foundation | 54

Page 55: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

REPRESENTATIONS AND WARRANTIES BY YOU

By accessing and/or accepting possession of any information in this Whitepaper or such part thereof (as the case may be), you represent and warrant to the Foundation and the Token Issuer as follows:

(a) you agree and acknowledge that the DATA Tokens do not constitute securities of any form, units in a business trust, units in a collective investment scheme or any other form of investment in any jurisdiction;

(b) you are not:

(i) located in the People’s Republic of China or a citizen or resident (tax or otherwise) of, or domiciled in, the People’s Republic of China;

(ii) located in the Republic of Korea or a citizen or resident (tax or otherwise) of, or domiciled in, the Republic of Korea;

(iii) located in the United States of America or a citizen, resident (tax or otherwise) or green card holder of, or domiciled in, the United States of America not being a U.S. Qualified Person; or

(iv) located in a jurisdiction where the Token Sale is prohibited, restricted or unauthorized in any form or manner whether in full or in part under the laws, regulatory requirements or rules in such jurisdiction;

(c) you agree and acknowledge that this Whitepaper does not constitute a prospectus or offer document of any sort and is not intended to constitute an offer of securities of any form, units in a business trust, units in a collective investment scheme or any other form of investment in any jurisdiction, or a solicitation for any form of investment, and you are not bound to enter into any contract or binding legal commitment and no cryptocurrency or other form of payment is to be accepted on the basis of this Whitepaper;

(d) you acknowledge and understand that no DATA Token should be construed, interpreted, classified or treated as enabling, or according any opportunity to, token holders to participate in or receive profits, income, or other payments or returns arising from or in connection with the DATA Tokens or the proceeds of the Token Sale, or to receive sums paid out of such profits, income, or other payments or returns;

(e) you agree and acknowledge that no regulatory authority has examined or approved of the information set out in this Whitepaper, no action has been or will be taken under the laws, regulatory requirements or rules of any jurisdiction and the publication, distribution or dissemination of this Whitepaper to you does not imply that the applicable laws, regulatory requirements or rules have been complied with;

(f) you agree and acknowledge that this Whitepaper, the undertaking and/or the completion of the Token Sale, or future trading of DATA Tokens on any cryptocurrency exchange, shall not be construed, interpreted or deemed by you as an indication of the merits of the Foundation, the Token Issuer, the DATA Tokens, the Token Sale, and the DATA platform;

Blockchain Data Foundation | 55

Page 56: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

(g) the distribution or dissemination of this Whitepaper, any part thereof or any copy thereof, or acceptance of the same by you, is not prohibited or restricted by the applicable laws, regulations or rules in your jurisdiction, and where any restrictions in relation to possession are applicable, you have observed and complied with all such restrictions at your own expense and without liability to the Foundation and/or the Token Issuer;

(h) you agree and acknowledge that in the case where you wish to acquire any DATA Tokens, DATA Tokens are not to be construed, interpreted, classified or treated as:

(i) any kind of currency other than cryptocurrency;

(ii) debentures, stocks or shares issued by any person or entity;

(iii) rights, options or derivatives in respect of such debentures, stocks or shares;

(iv) rights under a contract for differences or under any other contract the purpose or pretended purpose of which is to secure a profit or avoid a loss;

(v) units in a collective investment scheme;

(vi) units in a business trust;

(vii) derivatives of units in a business trust; or

(viii) any form of investment;

(i) you are legally permitted to participate in the Token Sale and all actions contemplated or associated with such participation, including the holding and use of DATA Tokens;

(j) the amounts that you use to acquire the DATA Tokens were not and are not directly or indirectly derived from any activities that contravene the laws and regulations of any jurisdiction, including anti-money laundering laws and regulations;

(k) if you are a natural person, you are of sufficient age and capacity under the applicable laws of the jurisdiction in which you reside and the jurisdiction of which you are a citizen to participate in the Token Sale;

(l) you are not obtaining or using DATA Tokens for any illegal purpose;

(m) you have a basic degree of understanding of the operation, functionality, usage, storage, transmission mechanisms and other material characteristics of cryptocurrencies, blockchain-based software systems, cryptocurrency wallets or other related token storage mechanisms, blockchain technology, and smart contract technology;

(n) you are fully aware and understand that in the case where you wish to purchase any DATA Tokens, there are risks associated with the Foundation and the Token Issuer and their business and operations, DATA Tokens, the Token Sale, and the DATA platform;

Blockchain Data Foundation | 56

Page 57: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

(o) you bear the sole responsibility to determine what tax implications a purchase of DATA Tokens may have for you and agree not to hold the Foundation, the Token Issuer and/or any other person involved in the Token Sale liable for any tax liability associated with or arising therefrom;

(p) you agree and acknowledge that the Foundation and the Token Issuer are not liable for any direct, indirect, special, incidental, consequential or other losses of any kind, in tort, contract or otherwise (including but not limited to loss of revenue, income or profits, and loss of use or data), arising out of or in connection with any acceptance of or reliance on this Whitepaper or any part thereof by you;

(q) you waive the right to participate in a class action lawsuit or a class wide arbitration against the Foundation, the Token Issuer and/or any person involved in the Token Sale and/or with the creation and distribution of DATA Tokens; and

(r) all of the above representations and warranties are true, complete, accurate and non-misleading from the time of your access to and/or acceptance of possession this Whitepaper or such part thereof (as the case may be).

CAUTIONARY NOTE ON FORWARD-LOOKING STATEMENTS

All statements contained in this Whitepaper, statements made in press releases or in any place accessible by the public and oral statements that may be made by the Foundation or the Token Issuer or their respective directors, executive officers or employees acting on behalf of the Foundation and/or the Token Issuer (as the case may be), that are not statements of historical fact, constitute “forward-looking statements”. Some of these statements can be identified by forward-looking terms such as “aim”, “target”, “anticipate”, “believe”, “could”, “estimate”, “expect”, “if”, “intend”, “may”, “plan”, “possible”, “probable”, “project”, “should”, “would”, “will” or other similar terms. However, these terms are not the exclusive means of identifying forward-looking statements. All statements regarding the Foundation and/or the Token Issuer’s business strategies, plans and prospects and the future prospects of the industry which the Foundation and/or the Token Issuer is in are forward-looking statements. These forward-looking statements, including but not limited to statements as to the Foundation and/or the Token Issuer’s prospects, future plans, other expected industry trends and other matters discussed in this Whitepaper regarding the Foundation and/or the Token Issuer are matters that are not historic facts, but only predictions.

These forward-looking statements involve known and unknown risks, uncertainties and other factors that may cause the actual future results, performance or achievements of the Foundation and/or the Token Issuer to be materially different from any future results, performance or achievements expected, expressed or implied by such forward-looking statements. These factors include, amongst others:

(a) changes in political, social, economic and stock or cryptocurrency market conditions, and the regulatory environment in the countries in which the Foundation and/or the Token Issuer conduct their business and operations;

(b) the risk that the Foundation may be unable to execute or implement their business strategies and future plans;

Blockchain Data Foundation | 57

Page 58: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

(c) changes in interest rates and exchange rates of fiat currencies and cryptocurrencies;

(d) changes in the anticipated growth strategies and expected internal growth of the Foundation and the DATA platform;

(e) changes in the availability and fees payable to the Foundation in connection with its businesses and operations or in the DATA platform;

(f) changes in the availability and salaries of employees who are required by the Foundation and/or the Token Issuer to operate their business and operations;

(g) changes in preferences of users of the DATA platform;

(h) changes in competitive conditions under which the Foundation operates, and the ability of the Foundation to compete under such conditions;

(i) changes in the future capital needs of the Foundation and the availability of financing and capital to fund such needs;

(j) war or acts of international or domestic terrorism;

(k) occurrences of catastrophic events, natural disasters and acts of God that affect the businesses and/or operations of the Foundation and/or the Token Issuer;

(l) other factors beyond the control of the Foundation and/or the Token Issuer; and

(m) any risk and uncertainties associated with the Foundation and the Token Issuer and their business and operations, the DATA Tokens, the Token Sale, and the DATA platform.

All forward-looking statements made by or attributable to the Foundation, the Token Issuer and/or persons acting on behalf of the Foundation and/or the Token Issuer are expressly qualified in their entirety by such factors. Given that risks and uncertainties that may cause the actual future results, performance or achievements of the Foundation and/or the Token Issuer to be materially different from that expected, expressed or implied by the forward-looking statements in this Whitepaper, undue reliance must not be placed on these statements. These forward-looking statements are applicable only as of the date of this Whitepaper.

None of the Foundation, the Token Issuer or any other person represents, warrants, and/or undertakes that the actual future results, performance or achievements of the Foundation and/or the Token Issuer will be as discussed in those forward-looking statements. The actual results, performance or achievements of the Foundation and/or the Token Issuer may differ materially from those anticipated in these forward-looking statements.

Nothing contained in this Whitepaper is or may be relied upon as a promise, representation or undertaking as to the future performance or policies of the Foundation and/or the Token Issuer.

Further, the Foundation and the Token Issuer disclaim any responsibility to update any of those forward-looking statements or publicly announce any revisions to those forward-looking

Blockchain Data Foundation | 58

Page 59: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

statements to reflect future developments, events or circumstances, even if new information becomes available or other events occur in the future.

THIRD PARTY INFORMATION AND NO CONSENT OF OTHER PERSONS

This Whitepaper includes information obtained from various third party sources (“Third Party Information”). None of the publishers of Third Party Information has consented to the inclusion of Third Party Information in this Whitepaper and is therefore not liable for Third Party Information. While reasonable action has been taken to ensure that Third Party Information has been included in their proper form and context, neither the Foundation, the Token Issuer nor their respective directors, executive officers, and employees acting on their behalf, has independently verified the accuracy, reliability, completeness of the contents, or ascertained any applicable underlying assumption, of the relevant Third Party Information. Consequently, neither the Foundation, the Token Issuer nor their respective directors, executive officers and employees acting on their behalf makes any representation or warranty as to the accuracy, reliability or completeness of such information and shall not be obliged to provide any updates on the same.

TERMS USED

To facilitate a better understanding of the DATA Tokens being the subject of the sale conducted by the Token Issuer, and the business and operations of the Foundation and the Token Issuer, certain technical terms and abbreviations, as well as, in certain instances, their descriptions, have been used in this Whitepaper. These descriptions and assigned meanings should not be treated as being definitive of their meanings and may not correspond to standard industry meanings or usage.

Words importing the singular shall, where applicable, include the plural and vice versa and words importing the masculine gender shall, where applicable, include the feminine and neuter genders and vice versa. References to persons shall include corporations.

NO ADVICE

No information in this Whitepaper should be considered to be business, legal, financial or tax advice regarding the Foundation, the Token Issuer, the DATA Tokens, the Token Sale, or the DATA platform. You should consult your own legal, financial, tax or other professional adviser regarding the Foundation and the Token Issuer and their business and operations, the DATA Tokens, the Token Sale, and the DATA platform. You should be aware that you may be required to bear the financial risk of any purchase of DATA Tokens for an indefinite period of time.

NO FURTHER INFORMATION OR UPDATE

No person has been or is authorized to give any information or representation not contained in this Whitepaper in connection with the Foundation and the Token Issuer and their business and operations, the DATA Tokens, the Token Sale, or the DATA platform, if given, such information or representation must not be relied upon as having been authorized by or on behalf of the Foundation or the Token Issuer. The Token Sale shall not, under any circumstances, constitute a continuing representation or create any suggestion or implication that there has been no change, or development reasonably likely to involve a material change in the affairs, conditions and

Blockchain Data Foundation | 59

Page 60: DATA - Site Title · When the end users spend their attention to consume services of their choice, the publishers/service providers/ media/developers manage to gather user attention

DECENTRALIZED AI-POWERED TRUST ALLIANCE

prospects of the Foundation and/or the Token Issuer or in any statement of fact or information contained in this Whitepaper since the date hereof.

RESTRICTIONS ON DISTRIBUTION AND DISSEMINATION

The distribution or dissemination of this Whitepaper or any part thereof may be prohibited or restricted by the laws, regulatory requirements, and rules of any jurisdiction. In the case where any restriction applies, you are to inform yourself about, and to observe, any restrictions which are applicable to your possession of this Whitepaper or such part thereof (as the case may be) at your own expense and without liability to the Foundation and/or the Token Issuer.

Persons to whom a copy of this Whitepaper has been distributed or disseminated, provided access to or who otherwise have the Whitepaper in their possession shall not circulate it to any other persons, reproduce or otherwise distribute this Whitepaper or any information contained herein for any purpose whatsoever nor permit or cause the same to occur.

NO OFFER OF INVESTMENT OR REGISTRATION

This Whitepaper does not constitute a prospectus or offer document of any sort and is not intended to constitute an offer of securities of any form, units in a business trust, units in a collective investment scheme or any other form of investment, or a solicitation for any form of investment in any jurisdiction. No person is bound to enter into any contract or binding legal commitment and no cryptocurrency or other form of payment is to be accepted on the basis of this Whitepaper.

No regulatory authority has examined or approved of any of the information set out in this Whitepaper. No such action has been or will be taken under the laws, regulatory requirements or rules of any jurisdiction. The publication, distribution or dissemination of this Whitepaper does not imply that the applicable laws, regulatory requirements or rules have been complied with.

RISKS AND UNCERTAINTIES

Prospective purchasers of DATA Tokens should carefully consider and evaluate all risks and uncertainties associated with the Foundation and the Token Issuer and their business and operations, the DATA Tokens, the Token Sale, and the DATA platform, all information set out in this Whitepaper and the Token Sale Terms prior to any purchase of the DATA Tokens. If any of such risks and uncertainties develops into actual events, the business, financial condition, results of operations and prospects of the Foundation and/or the Token Issuer could be materially and adversely affected. In such cases, you may lose all or part of the value of the DATA Tokens. Please refer to the risk factors set out in Exhibit 2 of the Token Sale Terms.

Blockchain Data Foundation | 60


Recommended